CVE-2026-35450Missing Authentication for Critical Function in Avideo

Severity
5.3MEDIUMNVD
EPSS
0.0%
top 87.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
Latest updateApr 4
PublishedApr 6

Description

WWBN AVideo is an open source video platform. In versions 26.0 and prior, the plugin/API/check.ffmpeg.json.php endpoint probes the FFmpeg remote server configuration and returns connectivity status without any authentication. All sibling FFmpeg management endpoints (kill.ffmpeg.json.php, list.ffmpeg.json.php, ffmpeg.php) require User::isAdmin().

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

CVEListV5wwbn/avideo26.0
Packagistwwbn/avideo26.0

🔴Vulnerability Details

2
OSV
AVideo: Unauthenticated FFmpeg Remote Server Status Disclosure via check.ffmpeg.json.php2026-04-04
GHSA
AVideo: Unauthenticated FFmpeg Remote Server Status Disclosure via check.ffmpeg.json.php2026-04-04

🕵️Threat Intelligence

1
Wiz
CVE-2026-35450 Impact, Exploitability, and Mitigation Steps | Wiz